. In this exercise, you will convert the essay you wrote in Project 3 to a PowerPoint presentation. Read this all through to the end once before you try it. 2. Find the image files you downloaded as

Place your order today and enjoy professional academic writing services—From simple class assignments to dissertations. Give us a chance to impress you.


Order a Similar Paper Order a Different Paper

. In this exercise, you will convert the essay you wrote in Project 3 to a PowerPoint presentation. Read this all through to the end once before you try it.2. Find the image files you downloaded as you will use them here.3. Outline and develop your presentation on paper or using a word processor first. You must have:  * A title slide, with a good title (not “PC Security Presentation”) that applies to the specific aspect of security you are discussing, and your name below the title.  * A slide which introduces your topic. State what it is, why it’s important.  * 2 or 3 slides which detail your topic.  * A conclusion slide, which sums up your details/findings.  * A Works Cited slide which has the URLs of the Internet references where you found your information.4. As you work this out, follow these guidelines:  * Title slide must use the Title slide format.  * Intro, detail and conclusions slides     * can use the Title and content format, or possibly Two content,     * must be bulleted,     * must have a relevant title at the top of the slide,     * must have “several” bullets of several words each. No blocks of text,     * should follow the good presentation principles you read about earlier,     * are where the 2 images go, anywhere you want in there but only 1 image per slide, appropriately sized and located, and     * each image must be referenced or discussed in one or more bullets.  * Works Cited slide should use the Title and body format, title is “Works Cited”.5. When you create your slides, be sure to:  * add a Theme to all slides.,  * have slide numbers on all slides except the title slide,  * use bullet symbols for all bullet points. Any style you want, but the same style on all slides,  * add a transition,  * spell check, and  * remember we are keeping it simple: no gifs, no videos, no audio, no animations, no links.6. When you’re ready, create your presentation. Begin by choosing a Theme, then set the title slide up since that shows first, then work along – add a slide, add content to a slide, etc. until the basics are all done.7. Now finish up by adding other required format items, like the slide numbers, transitions and spell check.8. Save your file. Call it PC Security Presentation

. In this exercise, you will convert the essay you wrote in Project 3 to a PowerPoint presentation. Read this all through to the end once before you try it. 2. Find the image files you downloaded as
Phishing attacks security issue Ganga Adhikari Technology has developed drastically over the past few years, therefore, making lives easier and increasing access to information. Despite the advantages, hackers are taking advantage of the technology to access intellectual property and steal data from companies leading to damaged reputation, denial-of-access, fines, and lawsuits. (Gupta et al. 2016). Phishing attacks involve social engineering attacks where hackers pretend to be trustworthy information sources and send emails with malicious attachments, which, once downloaded or opened, lead to accessing the intellectual property of an organization. Therefore, for phishing attacks to occur, hackers have to create a message or email which seems credible, an example, one may receive an email from their bank prompting them to click a link and change their passwords. Once the links are clicked, the hackers can access all customer’s bank details or transfer finances without the user’s consent. Once the attack occurs, the company’s finances and reputation are affected since data is stolen and exposed, leading to customers’ lost confidence in the company. Some customers may file lawsuits against the company for leaking their private information, while the government may fine the company for failing to maintain a strong security system. To prevent such attacks, employee education is paramount, such that everyone understands how such attacks occur and instant reports are created when phishing attacks are detected. Generally, the attackers normally target individuals with limited knowledge of effective internet use. Therefore, equipping employees with skills ensures they can differentiate between credible and malicious emails received. The organization’s technical team should develop measures for detecting and eliminating malicious files. By installing antimalware programs in the company’s system, files and links are automatically scanned, the warnings are issued for potentially malicious files. The antimalware programs should automatically filter emails and text messages by automatically deleting malicious ones. Companies are forcing employees to use the spam filter option to ensure that suspicious emails are not accessed or opened. (Al-Hamar et al. 2019). Patching software is an effective mechanism where technicians install the latest software in the company’s system since hackers normally take advantage of outdated programs. However, ensuring continuously updated systems ensures that an organization’s intellectual property is always protected. Finally, scanning and vulnerability testing is effective for organizations in preventing potential attacks. Through security scans, organizations can actively check for malicious files and links accessed and then eliminate them. In conclusion, although phishing attacks have increased gradually in the past years, through proper security deployment and education programs, people can actively prevent them. For example, through user education, one understands how hackers take advantage of ignorance to send malicious links and files. While through the installation of appropriate security scanning software and spam filtering preventing the opening of malicious files. References Gupta, S., Singhal, A., & Kapoor, A. (2016, April). A literature survey on social engineering attacks: Phishing attack. In 2016 international conference on computing, communication, and automation (ICCCA) (pp. 537-540). IEEE. https://ieeexplore.ieee.org/iel7/7795276/7813678/07813778.pdf?casa_token=mY2jOHomUQIAAAAA:2wK5VZsFIhUerM3NLckVs4bw4Y_RIppqBpw_wBTVhPVnJwoVvMo6dg7GGn-htHfoKCwxDxIKRA Al-Hamar, Y., Kolivand, H., & Al-Hamar, A. (2019, October). Phishing attacks in Qatar: A literature review of the problems and solutions. In 2019 12th International Conference on Developments in eSystems Engineering (DeSE) (pp. 837-842). IEEE. https://ieeexplore.ieee.org/iel7/9058621/9072947/09073226.pdf?casa_token=qH83s9gcPmkAAAAA:WHyrKQEZVSYriV53jhzygkrHKdzDEhszs7JPMs_IN-tau0ZUqyZSLgd0-C60ueXV80RPcSI59A 3
. In this exercise, you will convert the essay you wrote in Project 3 to a PowerPoint presentation. Read this all through to the end once before you try it. 2. Find the image files you downloaded as
Phishing attacks security issue Technology has developed drastically over the past few years, therefore, making lives easier and increasing access to information. Despite the advantages, hackers are taking advantage of the technology to access intellectual property and steal data from companies leading to damaged reputation, denial-of-access, fines, and lawsuits. (Gupta et al. 2016). Phishing attacks involve social engineering attacks where hackers pretend to be trustworthy information sources and send emails with malicious attachments, which, once downloaded or opened, lead to accessing the intellectual property of an organization. Therefore, for phishing attacks to occur, hackers have to create a message or email which seems credible, an example, one may receive an email from their bank prompting them to click a link and change their passwords. Once the links are clicked, the hackers can access all customer’s bank details or transfer finances without the user’s consent. Once the attack occurs, the company’s finances and reputation are affected since data is stolen and exposed, leading to customers’ lost confidence in the company. Some customers may file lawsuits against the company for leaking their private information, while the government may fine the company for failing to maintain a strong security system. To prevent such attacks, employee education is paramount, such that everyone understands how such attacks occur and instant reports are created when phishing attacks are detected. Generally, the attackers normally target individuals with limited knowledge of effective internet use. Therefore, equipping employees with skills ensures they can differentiate between credible and malicious emails received. The organization’s technical team should develop measures for detecting and eliminating malicious files. By installing antimalware programs in the company’s system, files and links are automatically scanned, the warnings are issued for potentially malicious files. The antimalware programs should automatically filter emails and text messages by automatically deleting malicious ones. Companies are forcing employees to use the spam filter option to ensure that suspicious emails are not accessed or opened. (Al-Hamar et al. 2019). Patching software is an effective mechanism where technicians install the latest software in the company’s system since hackers normally take advantage of outdated programs. However, ensuring continuously updated systems ensures that an organization’s intellectual property is always protected. Finally, scanning and vulnerability testing is effective for organizations in preventing potential attacks. Through security scans, organizations can actively check for malicious files and links accessed and then eliminate them. In conclusion, although phishing attacks have increased gradually in the past years, through proper security deployment and education programs, people can actively prevent them. For example, through user education, one understands how hackers take advantage of ignorance to send malicious links and files. While through the installation of appropriate security scanning software and spam filtering preventing the opening of malicious files. References Gupta, S., Singhal, A., & Kapoor, A. (2016, April). A literature survey on social engineering attacks: Phishing attack. In 2016 international conference on computing, communication, and automation (ICCCA) (pp. 537-540). IEEE. https://ieeexplore.ieee.org/iel7/7795276/7813678/07813778.pdf?casa_token=mY2jOHomUQIAAAAA:2wK5VZsFIhUerM3NLckVs4bw4Y_RIppqBpw_wBTVhPVnJwoVvMo6dg7GGn-htHfoKCwxDxIKRA Al-Hamar, Y., Kolivand, H., & Al-Hamar, A. (2019, October). Phishing attacks in Qatar: A literature review of the problems and solutions. In 2019 12th International Conference on Developments in eSystems Engineering (DeSE) (pp. 837-842). IEEE. https://ieeexplore.ieee.org/iel7/9058621/9072947/09073226.pdf?casa_token=qH83s9gcPmkAAAAA:WHyrKQEZVSYriV53jhzygkrHKdzDEhszs7JPMs_IN-tau0ZUqyZSLgd0-C60ueXV80RPcSI59A 3

Writerbay.net

When writing your assignment, we aim to help you get an A, not just beat the deadline.

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now


Order a Similar Paper Order a Different Paper